<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: stats. eval and search macros? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/stats-eval-and-search-macros/m-p/78952#M19964</link>
    <description>&lt;P&gt;Interesting.  I think there was something wrong with the macros.conf file.
I opened it to paste the contents, and it looked like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[receive_event]
definition = ( (event_id="DELIVER" AND source_id="STOREDRIVER") OR\
(event_id=1023) )\

iseval = 0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;My other eval/macro was working that looked like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[send_event]
definition = ( (event_id="TRANSFER" AND source_id="ROUTING") OR (event_id=1033) )
iseval = 0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So, I modified the receive_event manually to look like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[receive_event]
definition = ( (event_id="DELIVER" AND source_id="STOREDRIVER") OR (event_id=1023) )
iseval = 0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And now it seems to be working.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Apr 2011 23:32:53 GMT</pubDate>
    <dc:creator>jgauthier</dc:creator>
    <dc:date>2011-04-11T23:32:53Z</dc:date>
    <item>
      <title>stats. eval and search macros?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/stats-eval-and-search-macros/m-p/78950#M19962</link>
      <description>&lt;P&gt;I am using a search macro in an eval and it returns all zeros.
But, when I expand it, it functions as expected.   Is that normal?&lt;/P&gt;

&lt;P&gt;ie:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; `get_all_email` | stats count(eval(`receive_event`)) as Sent by recipientlist
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This returns all zeros.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;`get_all_email` | stats count(eval(((event_id="DELIVER" AND source_id="STOREDRIVER") OR (event_id=1023)))) as Sent by recipientlist
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This works perfectly.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2011 22:06:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/stats-eval-and-search-macros/m-p/78950#M19962</guid>
      <dc:creator>jgauthier</dc:creator>
      <dc:date>2011-04-11T22:06:16Z</dc:date>
    </item>
    <item>
      <title>Re: stats. eval and search macros?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/stats-eval-and-search-macros/m-p/78951#M19963</link>
      <description>&lt;P&gt;it would be helpful to see your macro definition/macros.conf file.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2011 22:50:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/stats-eval-and-search-macros/m-p/78951#M19963</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2011-04-11T22:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: stats. eval and search macros?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/stats-eval-and-search-macros/m-p/78952#M19964</link>
      <description>&lt;P&gt;Interesting.  I think there was something wrong with the macros.conf file.
I opened it to paste the contents, and it looked like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[receive_event]
definition = ( (event_id="DELIVER" AND source_id="STOREDRIVER") OR\
(event_id=1023) )\

iseval = 0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;My other eval/macro was working that looked like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[send_event]
definition = ( (event_id="TRANSFER" AND source_id="ROUTING") OR (event_id=1033) )
iseval = 0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;So, I modified the receive_event manually to look like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[receive_event]
definition = ( (event_id="DELIVER" AND source_id="STOREDRIVER") OR (event_id=1023) )
iseval = 0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And now it seems to be working.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2011 23:32:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/stats-eval-and-search-macros/m-p/78952#M19964</guid>
      <dc:creator>jgauthier</dc:creator>
      <dc:date>2011-04-11T23:32:53Z</dc:date>
    </item>
    <item>
      <title>Re: stats. eval and search macros?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/stats-eval-and-search-macros/m-p/78953#M19965</link>
      <description>&lt;P&gt;that looks like a bug in the UI putting linebreaks into the macro.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2011 23:49:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/stats-eval-and-search-macros/m-p/78953#M19965</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2011-04-11T23:49:03Z</dc:date>
    </item>
  </channel>
</rss>

